Browsing Book Chapters by Title

DSpace/Manakin Repository

Search OPUS


Advanced Search

Browse

My Account

Browsing Book Chapters by Title

Sort by: Order: Results:

  • Ying, M (Elsevier, 2007-01)
    An axiomatization of a mathematical theory consists of a system of basic notions as well as a set of axioms about these notions. The mathematical theory is then the set of theorems which can be derived from the axioms. ...
  • Henderson-Sellers, B (SPRINGER-VERLAG BERLIN, 2011-01-01)
  • Zhang, H; Zhao, Y; Cao, L; Zhang, C; Bohlscheid, H (IGI Global, 2010-01)
    In this chapter, the authors propose a novel framework for rare class association rule mining. In each class association rule, the right-hand is a target class while the left-hand may contain one or more attributes. This ...
  • Luo, C; Zhao, Y; Luo, D; Ou, Y; Liu, L (IGI Global, 2010-01)
    This chapter aims to provide a comprehensive survey of the current advanced technologies of exception mining in stock market. The stock market surveillance is to identify market anomalies so as to provide a fair and efficient ...
  • Zeng, C; Jia, W; He, S; Xu, M (IGI Global, 2013-01)
    Image segmentation techniques using graph theory has become a thriving research area in computer vision community in recent years. This chapter mainly focuses on the most up-to-date research achievements in graph-based ...
  • Xiao, B; Gao, X; Tao, D; Li, X (Springer-Verlag Berlin / Heidelberg, 2011-01)
    Summary. Face recognition by sketches in photos makes an important complement to face photo recognition. It is challenging because sketches and photos have geometrical deformations and texture difference. Aiming to achieve ...
  • Li, L; Xiao, H; Xu, G (IGI Global, 2013)
    Computing similarity between short microblogs is an important step in microblog recommendation. In this chapter, the authors utilize three kinds of approaches-traditional term-based approach, WordNetbased semantic approach, ...
  • Nikodem, J; Nikodem, M; Woda, M; Klempous, R; Chaczko, ZC (InTech, 2010-01)
    Chapter 7 introduces a relational model that represents the dependences between nodes of the network and defines the actions of these nodes in different situations. Based on this model, communication activities of the ...
  • Anderson, TK (Information Science Reference, 2008-01)
  • Debenham, JK; Sierra, C (Springer, 2010-01)
    A model of reputation is presented in which agents share and aggregate their opinions, and observe the way in which their opinions effect the opinions of others. A method is proposed that supports the deliberative process ...
  • Zowghi, D; Coulin, C (Springer Berlin Heidelberg, 2005)
    Requirements elicitation is the process of seeking, uncovering, acquiring, and elaborating requirements for computer based systems. It is generally understood that requirements are elicited rather than just captured or ...
  • Coulin, CR; Zowghi, D (Information Science Publishing, 2005-01)
  • Light, A; Anderson, TK (Springer, 2009-01)
    This paper reflects on the relationship between who one designs for and what one designs in the unstructured space of designing for political change; in particular, for supporting "International Development" with ICT. We ...
  • Zhang, Y; Weakley, AJ; Edmonds, EA (Springer, 2007-01)
    This paper extends the knowledge and understanding of art-technology collaboration. It reports upon a close empirical study of how computer programmers interacted with a digital artist to develop a computer-based interactive ...
  • Demong, NA; Lu, J (Springer, 2012-01)
    Investment in the real estate industry is subject to high risk, especially when there are a large number of uncertainty factors in a project. Risk analysis has been widely used to make decisions for real estate investment. ...
  • Deng, C; Gao, X; Li, X; Tao, D (Springer-Verlag Berlin / Heidelberg, 2011-01)
    Abstract. In image watermarking, binding the watermark synchronization with the local features has been widely used to provide robustness against geometric distortions as well as common image processing operations. However, ...
  • Gill, AQ; Bunker, D (IGI, 2013-01)
    The emergence of Software as a Service (SaaS) has made it possible to develop dynamic and complex business processes as eServices. The development of business processes as eServices (SaaS) can be assisted by the means of ...
  • Nanda, P; He, X (IGI Global, 2009)
    The evolution of Internet and its successful technologies has brought a tremendous growth in business, education, research etc. over the last four decades. With the dramatic advances in multimedia technologies and the ...
  • Sinha, S; Chaczko, Z; Klempous, R (2009)
    Wireless Sensor Networks (WSN) is fast becoming the holy grail of digital surveillance, data monitoring and analysis. Being relatively cheap, lowpowered and easy to deploy WSNs is being adopted in a range of different ...
  • da Rimini, F (Information Science Reference, 2007-01)
    This publication examines how the use of open source software affects practices in society, business, government, education and law. It provides a balance of theoretical perspectives, experiences and cases in relation to ...